93
13
Cybersecurity Best Practice
It’s important to locate the Inverter in a secure network zone (e.g., SCADA network
or PCN), that is blocked from direct communication with the Internet and/or
Corporate IT networks by network security devices (e.g., firewalls). This network
isolation concept is a best practice recommendation based on the Purdue
Reference Model (PRM), an industry leading Industrial Control System (ICS)
cybersecurity model adopted by standards and frameworks such as the ISA 62443,
NIST, Cybersecurity Framework, and NERC CIP.
For more information, please reference “Secure Network and Firewall
Deployment Recommendations for SCADA Systems” by the Cybersecurity and
Infrastructure Security Agency (CISA) https://www.cisa.gov/resources-tools/
resources/ics-recommended-practices . cisa.gov/ics/Abstract-Firewall-
Deployment-ICS-Networks-RP